@@ -134,11 +134,11 @@ managed service to make that available for use by one or more in-cluster
134
134
applications. When a new ` ServiceInstance ` resource is created, the service catalog
135
135
controller will connect to the appropriate broker server and instruct it to
136
136
provision the service instance.
137
- - ` ServiceInstanceCredential ` : A "binding" to an ` ServiceInstance ` . These are created by cluster users
138
- who wish for their applications to make use of a service ` ServiceInstance ` . Upon
139
- creation, the service catalog controller will create a Kubernetes ` Secret `
140
- containing connection details and credentials for the service instance. Such
141
- ` Secret ` s can be mounted into pods as usual.
137
+ - ` ServiceInstanceCredential ` : Access credential to a ` ServiceInstance ` . These
138
+ are created by cluster users who wish for their applications to make use of a
139
+ service ` ServiceInstance ` . Upon creation, the service catalog controller will
140
+ create a Kubernetes ` Secret ` containing connection details and credentials for
141
+ the service instance. Such ` Secret ` s can be mounted into pods as usual.
142
142
143
143
These concepts and resources are the building blocks of the service catalog.
144
144
@@ -384,18 +384,18 @@ status:
384
384
# # Step 9 - ServiceInstanceCredential to the ServiceInstance
385
385
386
386
Now that our `ServiceInstance` has been created, we can bind to it. To accomplish this,
387
- we will create a [`ServiceInstanceCredential`](../contrib/examples/walkthrough/ups-binding .yaml)
387
+ we will create a [`ServiceInstanceCredential`](../contrib/examples/walkthrough/ups-instance-credential .yaml)
388
388
resource.
389
389
390
390
` ` ` console
391
- kubectl --context=service-catalog create -f contrib/examples/walkthrough/ups-binding .yaml
391
+ kubectl --context=service-catalog create -f contrib/examples/walkthrough/ups-instance-credential .yaml
392
392
` ` `
393
393
394
394
395
395
That command should output :
396
396
397
397
` ` ` console
398
- binding "ups-binding " created
398
+ binding "ups-instance-credential " created
399
399
` ` `
400
400
401
401
After the `ServiceInstanceCredential` resource is created, the service catalog controller will
@@ -405,13 +405,13 @@ service catalog controller will insert into a Kubernetes `Secret`. We can check
405
405
the status of this process like so :
406
406
407
407
` ` ` console
408
- kubectl --context=service-catalog get bindings -n test-ns ups-binding -o yaml
408
+ kubectl --context=service-catalog get bindings -n test-ns ups-instance-credential -o yaml
409
409
` ` `
410
410
411
411
_NOTE : if using the API aggregator, you will need to use the fully qualified name of the binding resource due to [issue 1008](https://github.com/kubernetes-incubator/service-catalog/issues/1008):_
412
412
413
413
` ` ` console
414
- kubectl get bindings.v1alpha1.servicecatalog.k8s.io -n test-ns ups-binding -o yaml
414
+ kubectl get bindings.v1alpha1.servicecatalog.k8s.io -n test-ns ups-instance-credential -o yaml
415
415
` ` `
416
416
417
417
We should see something like :
@@ -423,16 +423,16 @@ metadata:
423
423
creationTimestamp: 2017-03-07T01:44:36Z
424
424
finalizers:
425
425
- kubernetes
426
- name: ups-binding
426
+ name: ups-instance-credential
427
427
namespace: test-ns
428
428
resourceVersion: "29"
429
- selfLink: /apis/servicecatalog.k8s.io/v1alpha1/namespaces/test-ns/bindings/ups-binding
429
+ selfLink: /apis/servicecatalog.k8s.io/v1alpha1/namespaces/test-ns/bindings/ups-instance-credential
430
430
uid: 9eb2cdce-02d7-11e7-8edb-0242ac110005
431
431
spec:
432
432
instanceRef:
433
433
name: ups-instance
434
434
externalID: b041db94-a5a0-41a2-87ae-1025ba760918
435
- secretName: ups-binding
435
+ secretName: ups-instance-credential
436
436
status:
437
437
conditions:
438
438
- message: Injected bind result
@@ -447,24 +447,24 @@ see a new one:
447
447
448
448
` ` ` console
449
449
kubectl get secrets -n test-ns
450
- NAME TYPE DATA AGE
451
- default-token-3k61z kubernetes.io/service-account-token 3 29m
452
- ups-binding Opaque 2 1m
450
+ NAME TYPE DATA AGE
451
+ default-token-3k61z kubernetes.io/service-account-token 3 29m
452
+ ups-instance-credential Opaque 2 1m
453
453
` ` `
454
454
455
- Notice that a new `Secret` named `ups-binding ` has been created.
455
+ Notice that a new `Secret` named `ups-instance-credential ` has been created.
456
456
457
457
# # Step 10 - Unbinding from the ServiceInstance
458
458
459
459
Now, let's unbind from the instance. To do this, we simply *delete* the
460
460
`ServiceInstanceCredential` resource that we previously created :
461
461
462
462
` ` ` console
463
- kubectl --context=service-catalog delete -n test-ns bindings ups-binding
463
+ kubectl --context=service-catalog delete -n test-ns bindings ups-instance-credential
464
464
` ` `
465
465
466
466
Checking the `Secret`s in the `test-ns` namespace, we should see that
467
- `ups-binding ` has also been deleted :
467
+ `ups-instance-credential ` has also been deleted :
468
468
469
469
` ` ` console
470
470
kubectl get secrets -n test-ns
0 commit comments